Sciweavers

5843 search results - page 49 / 1169
» Software Security in Practice
Sort
View
101
Voted
SOFTWARE
1998
15 years 2 months ago
Scenarios in System Development: Current Practice
Klaus Weidenhaupt, Klaus Pohl, Matthias Jarke, Pet...
93
Voted
XPU
2010
Springer
15 years 1 months ago
Product and Release Planning Practices for Extreme Programming
Gert van Valkenhoef, Tommi Tervonen, Bert de Brock...
89
Voted
COMPSEC
2002
92views more  COMPSEC 2002»
15 years 2 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
107
Voted
CCS
2008
ACM
15 years 4 months ago
Avoiding timing channels in fixed-priority schedulers
A practically feasible modification to fixed-priority schedulers allows to avoid timing channels despite threads having access to precise clocks. This modification is rather simpl...
Marcus Völp, Claude-Joachim Hamann, Hermann H...
150
Voted
CCS
2010
ACM
15 years 3 months ago
Practical leakage-resilient identity-based encryption from simple assumptions
We provide new constructions of Leakage-Resilient IdentityBased Encryption systems (IBE) in the Standard model. We apply a hash proof technique in the existing IBE schemes of Bone...
Sherman S. M. Chow, Yevgeniy Dodis, Yannis Rousela...